Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/01/2025, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7ad116ac37e2f0968dd423edcdb5dc52.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_7ad116ac37e2f0968dd423edcdb5dc52.exe
-
Size
95KB
-
MD5
7ad116ac37e2f0968dd423edcdb5dc52
-
SHA1
c336a92233ef1338cd46cd88c62238f7b3a45d27
-
SHA256
21e80677ddeb030c34cacddf936bc5791e09e73f467012c22a8ecc2a21ee13a9
-
SHA512
43b25586c7bc82c71543b20a3c275981dd07ad36eb817155298ab78ee8886a11eaf6c824150a639975704e2988ef527ad04587c1f43cbc4e6336492b5fb08317
-
SSDEEP
768:U06R0UKzOgnKqGR7//GPc0LOBhvBrHks3IiyhDYQbGmxlNaM+WGa1wuxnzgOYw9Y:KR0vxn3Pc0LCH9MtbvabUDzJYWu3B
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 2708 WaterMark.exe -
Loads dropped DLL 2 IoCs
pid Process 2784 JaffaCakes118_7ad116ac37e2f0968dd423edcdb5dc52.exe 2784 JaffaCakes118_7ad116ac37e2f0968dd423edcdb5dc52.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
resource yara_rule behavioral1/memory/2784-5-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2784-4-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2784-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2784-1-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2784-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2784-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2784-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2708-26-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2708-69-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2708-579-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libvoc_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\meta_engine\libtaglib_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libinvert_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libscale_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\mozavutil.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\System.Speech.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libnoseek_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libglinterop_dxva2_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\1.7\Microsoft.Ink.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libcrystalhd_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\sunmscapi.dll svchost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\clearkey.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\UIAutomationProvider.resources.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadcer.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\license.html svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\flyout.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\dicjp.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libd3d11va_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libdeinterlace_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Mail\MSOERES.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSORES.DLL svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_elf.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\sawindbg.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\UIAutomationClient.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\index.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi422_yuy2_mmx_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libpostproc_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\error_window.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\libntservice_plugin.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\msdbg2.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\UIAutomationProvider.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ReachFramework.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\settings.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libtcp_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\libaudiobargraph_v_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\text_renderer\libtdummy_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libmagnify_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_filter\libcache_block_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\RSSFeeds.html svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\weather.html svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\JAWTAccessBridge-64.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\license.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_view.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libimage_plugin.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\System.RunTime.Serialization.Resources.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DBGHELP.DLL svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msdarem.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\jdwp.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\WebKit.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\System.RunTime.Serialization.Resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\ReachFramework.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libscaletempo_pitch_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\cpu.html svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\jawt.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-string-l1-1-0.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\PresentationBuildTasks.resources.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7ad116ac37e2f0968dd423edcdb5dc52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2708 WaterMark.exe 2708 WaterMark.exe 2708 WaterMark.exe 2708 WaterMark.exe 2708 WaterMark.exe 2708 WaterMark.exe 2708 WaterMark.exe 2708 WaterMark.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2708 WaterMark.exe Token: SeDebugPrivilege 2332 svchost.exe Token: SeDebugPrivilege 2708 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2784 JaffaCakes118_7ad116ac37e2f0968dd423edcdb5dc52.exe 2708 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2708 2784 JaffaCakes118_7ad116ac37e2f0968dd423edcdb5dc52.exe 30 PID 2784 wrote to memory of 2708 2784 JaffaCakes118_7ad116ac37e2f0968dd423edcdb5dc52.exe 30 PID 2784 wrote to memory of 2708 2784 JaffaCakes118_7ad116ac37e2f0968dd423edcdb5dc52.exe 30 PID 2784 wrote to memory of 2708 2784 JaffaCakes118_7ad116ac37e2f0968dd423edcdb5dc52.exe 30 PID 2708 wrote to memory of 1688 2708 WaterMark.exe 31 PID 2708 wrote to memory of 1688 2708 WaterMark.exe 31 PID 2708 wrote to memory of 1688 2708 WaterMark.exe 31 PID 2708 wrote to memory of 1688 2708 WaterMark.exe 31 PID 2708 wrote to memory of 1688 2708 WaterMark.exe 31 PID 2708 wrote to memory of 1688 2708 WaterMark.exe 31 PID 2708 wrote to memory of 1688 2708 WaterMark.exe 31 PID 2708 wrote to memory of 1688 2708 WaterMark.exe 31 PID 2708 wrote to memory of 1688 2708 WaterMark.exe 31 PID 2708 wrote to memory of 1688 2708 WaterMark.exe 31 PID 2708 wrote to memory of 2332 2708 WaterMark.exe 32 PID 2708 wrote to memory of 2332 2708 WaterMark.exe 32 PID 2708 wrote to memory of 2332 2708 WaterMark.exe 32 PID 2708 wrote to memory of 2332 2708 WaterMark.exe 32 PID 2708 wrote to memory of 2332 2708 WaterMark.exe 32 PID 2708 wrote to memory of 2332 2708 WaterMark.exe 32 PID 2708 wrote to memory of 2332 2708 WaterMark.exe 32 PID 2708 wrote to memory of 2332 2708 WaterMark.exe 32 PID 2708 wrote to memory of 2332 2708 WaterMark.exe 32 PID 2708 wrote to memory of 2332 2708 WaterMark.exe 32 PID 2332 wrote to memory of 256 2332 svchost.exe 1 PID 2332 wrote to memory of 256 2332 svchost.exe 1 PID 2332 wrote to memory of 256 2332 svchost.exe 1 PID 2332 wrote to memory of 256 2332 svchost.exe 1 PID 2332 wrote to memory of 256 2332 svchost.exe 1 PID 2332 wrote to memory of 332 2332 svchost.exe 2 PID 2332 wrote to memory of 332 2332 svchost.exe 2 PID 2332 wrote to memory of 332 2332 svchost.exe 2 PID 2332 wrote to memory of 332 2332 svchost.exe 2 PID 2332 wrote to memory of 332 2332 svchost.exe 2 PID 2332 wrote to memory of 384 2332 svchost.exe 3 PID 2332 wrote to memory of 384 2332 svchost.exe 3 PID 2332 wrote to memory of 384 2332 svchost.exe 3 PID 2332 wrote to memory of 384 2332 svchost.exe 3 PID 2332 wrote to memory of 384 2332 svchost.exe 3 PID 2332 wrote to memory of 392 2332 svchost.exe 4 PID 2332 wrote to memory of 392 2332 svchost.exe 4 PID 2332 wrote to memory of 392 2332 svchost.exe 4 PID 2332 wrote to memory of 392 2332 svchost.exe 4 PID 2332 wrote to memory of 392 2332 svchost.exe 4 PID 2332 wrote to memory of 432 2332 svchost.exe 5 PID 2332 wrote to memory of 432 2332 svchost.exe 5 PID 2332 wrote to memory of 432 2332 svchost.exe 5 PID 2332 wrote to memory of 432 2332 svchost.exe 5 PID 2332 wrote to memory of 432 2332 svchost.exe 5 PID 2332 wrote to memory of 480 2332 svchost.exe 6 PID 2332 wrote to memory of 480 2332 svchost.exe 6 PID 2332 wrote to memory of 480 2332 svchost.exe 6 PID 2332 wrote to memory of 480 2332 svchost.exe 6 PID 2332 wrote to memory of 480 2332 svchost.exe 6 PID 2332 wrote to memory of 488 2332 svchost.exe 7 PID 2332 wrote to memory of 488 2332 svchost.exe 7 PID 2332 wrote to memory of 488 2332 svchost.exe 7 PID 2332 wrote to memory of 488 2332 svchost.exe 7 PID 2332 wrote to memory of 488 2332 svchost.exe 7 PID 2332 wrote to memory of 496 2332 svchost.exe 8 PID 2332 wrote to memory of 496 2332 svchost.exe 8 PID 2332 wrote to memory of 496 2332 svchost.exe 8 PID 2332 wrote to memory of 496 2332 svchost.exe 8 PID 2332 wrote to memory of 496 2332 svchost.exe 8
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:608
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:1248
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1316
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:684
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:752
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:816
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1176
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:852
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:2728
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:968
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:276
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:300
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1072
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1116
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:2020
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:2152
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:1824
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:488
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:496
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:392
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7ad116ac37e2f0968dd423edcdb5dc52.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7ad116ac37e2f0968dd423edcdb5dc52.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1688
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize204KB
MD555aee693c27513c8a84c97e52b0f5d7a
SHA1ba09360d2e0470fdedeee7681d6ecf859bf38414
SHA25692774bc89a2ce1723654adad745f858d81d7ce3fedc047114d2370c1ddcd9404
SHA51218a70a4a411931b14322c4bccdf2146f5fbbc7804d7e4098f7ce37102c0e4d31eff6a86d20e6de8affe181146b499f5a3f1a507a3bad79904b7f73b9e49b4c46
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize200KB
MD576ec126dda93cdd0b81ee0670e73377e
SHA16e021c3959f72a32ca2ecb69f860323338b23268
SHA2565a3cdfeb213c8ac073721098459f23e17d122f8a907f09de223e9d91aa135306
SHA5121c2638d48d9f2119c3402d771fc3bf2f936ae03ec86bbe01bffb7e67bf771072ff20cb8a42412d7dcc8435a3ac778f99ce9d3d874ba9a396fe8e7ba5e107bb78
-
Filesize
95KB
MD57ad116ac37e2f0968dd423edcdb5dc52
SHA1c336a92233ef1338cd46cd88c62238f7b3a45d27
SHA25621e80677ddeb030c34cacddf936bc5791e09e73f467012c22a8ecc2a21ee13a9
SHA51243b25586c7bc82c71543b20a3c275981dd07ad36eb817155298ab78ee8886a11eaf6c824150a639975704e2988ef527ad04587c1f43cbc4e6336492b5fb08317